xref: /linux/arch/x86/include/asm/processor.h (revision 07114f0f1cda8b2ef6e884d0c7b268a32cce7903)
11965aae3SH. Peter Anvin #ifndef _ASM_X86_PROCESSOR_H
21965aae3SH. Peter Anvin #define _ASM_X86_PROCESSOR_H
3bb898558SAl Viro 
4bb898558SAl Viro #include <asm/processor-flags.h>
5bb898558SAl Viro 
6bb898558SAl Viro /* Forward declaration, a strange C thing */
7bb898558SAl Viro struct task_struct;
8bb898558SAl Viro struct mm_struct;
9bb898558SAl Viro 
10bb898558SAl Viro #include <asm/vm86.h>
11bb898558SAl Viro #include <asm/math_emu.h>
12bb898558SAl Viro #include <asm/segment.h>
13bb898558SAl Viro #include <asm/types.h>
14bb898558SAl Viro #include <asm/sigcontext.h>
15bb898558SAl Viro #include <asm/current.h>
16bb898558SAl Viro #include <asm/cpufeature.h>
17bb898558SAl Viro #include <asm/page.h>
1854321d94SJeremy Fitzhardinge #include <asm/pgtable_types.h>
19bb898558SAl Viro #include <asm/percpu.h>
20bb898558SAl Viro #include <asm/msr.h>
21bb898558SAl Viro #include <asm/desc_defs.h>
22bb898558SAl Viro #include <asm/nops.h>
23f05e798aSDavid Howells #include <asm/special_insns.h>
24bb898558SAl Viro 
25bb898558SAl Viro #include <linux/personality.h>
26bb898558SAl Viro #include <linux/cpumask.h>
27bb898558SAl Viro #include <linux/cache.h>
28bb898558SAl Viro #include <linux/threads.h>
295cbc19a9SPeter Zijlstra #include <linux/math64.h>
30faa4602eSPeter Zijlstra #include <linux/err.h>
31f05e798aSDavid Howells #include <linux/irqflags.h>
32f05e798aSDavid Howells 
33f05e798aSDavid Howells /*
34f05e798aSDavid Howells  * We handle most unaligned accesses in hardware.  On the other hand
35f05e798aSDavid Howells  * unaligned DMA can be quite expensive on some Nehalem processors.
36f05e798aSDavid Howells  *
37f05e798aSDavid Howells  * Based on this we disable the IP header alignment in network drivers.
38f05e798aSDavid Howells  */
39f05e798aSDavid Howells #define NET_IP_ALIGN	0
40bb898558SAl Viro 
41b332828cSK.Prasad #define HBP_NUM 4
42bb898558SAl Viro /*
43bb898558SAl Viro  * Default implementation of macro that returns current
44bb898558SAl Viro  * instruction pointer ("program counter").
45bb898558SAl Viro  */
46bb898558SAl Viro static inline void *current_text_addr(void)
47bb898558SAl Viro {
48bb898558SAl Viro 	void *pc;
49bb898558SAl Viro 
50bb898558SAl Viro 	asm volatile("mov $1f, %0; 1:":"=r" (pc));
51bb898558SAl Viro 
52bb898558SAl Viro 	return pc;
53bb898558SAl Viro }
54bb898558SAl Viro 
55bb898558SAl Viro #ifdef CONFIG_X86_VSMP
56bb898558SAl Viro # define ARCH_MIN_TASKALIGN		(1 << INTERNODE_CACHE_SHIFT)
57bb898558SAl Viro # define ARCH_MIN_MMSTRUCT_ALIGN	(1 << INTERNODE_CACHE_SHIFT)
58bb898558SAl Viro #else
59bb898558SAl Viro # define ARCH_MIN_TASKALIGN		16
60bb898558SAl Viro # define ARCH_MIN_MMSTRUCT_ALIGN	0
61bb898558SAl Viro #endif
62bb898558SAl Viro 
63e0ba94f1SAlex Shi enum tlb_infos {
64e0ba94f1SAlex Shi 	ENTRIES,
65e0ba94f1SAlex Shi 	NR_INFO
66e0ba94f1SAlex Shi };
67e0ba94f1SAlex Shi 
68e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lli_4k[NR_INFO];
69e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lli_2m[NR_INFO];
70e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lli_4m[NR_INFO];
71e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lld_4k[NR_INFO];
72e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lld_2m[NR_INFO];
73e0ba94f1SAlex Shi extern u16 __read_mostly tlb_lld_4m[NR_INFO];
74dd360393SKirill A. Shutemov extern u16 __read_mostly tlb_lld_1g[NR_INFO];
75c4211f42SAlex Shi 
76bb898558SAl Viro /*
77bb898558SAl Viro  *  CPU type and hardware bug flags. Kept separately for each CPU.
78bb898558SAl Viro  *  Members of this structure are referenced in head.S, so think twice
79bb898558SAl Viro  *  before touching them. [mj]
80bb898558SAl Viro  */
81bb898558SAl Viro 
82bb898558SAl Viro struct cpuinfo_x86 {
83bb898558SAl Viro 	__u8			x86;		/* CPU family */
84bb898558SAl Viro 	__u8			x86_vendor;	/* CPU vendor */
85bb898558SAl Viro 	__u8			x86_model;
86bb898558SAl Viro 	__u8			x86_mask;
87bb898558SAl Viro #ifdef CONFIG_X86_32
88bb898558SAl Viro 	char			wp_works_ok;	/* It doesn't on 386's */
89bb898558SAl Viro 
90bb898558SAl Viro 	/* Problems on some 486Dx4's and old 386's: */
91bb898558SAl Viro 	char			rfu;
92bb898558SAl Viro 	char			pad0;
9360e019ebSH. Peter Anvin 	char			pad1;
94bb898558SAl Viro #else
95bb898558SAl Viro 	/* Number of 4K pages in DTLB/ITLB combined(in pages): */
96bb898558SAl Viro 	int			x86_tlbsize;
9713c6c532SJan Beulich #endif
98bb898558SAl Viro 	__u8			x86_virt_bits;
99bb898558SAl Viro 	__u8			x86_phys_bits;
100bb898558SAl Viro 	/* CPUID returned core id bits: */
101bb898558SAl Viro 	__u8			x86_coreid_bits;
102bb898558SAl Viro 	/* Max extended CPUID function supported: */
103bb898558SAl Viro 	__u32			extended_cpuid_level;
104bb898558SAl Viro 	/* Maximum supported CPUID level, -1=no CPUID: */
105bb898558SAl Viro 	int			cpuid_level;
10665fc985bSBorislav Petkov 	__u32			x86_capability[NCAPINTS + NBUGINTS];
107bb898558SAl Viro 	char			x86_vendor_id[16];
108bb898558SAl Viro 	char			x86_model_id[64];
109bb898558SAl Viro 	/* in KB - valid for CPUS which support this call: */
110bb898558SAl Viro 	int			x86_cache_size;
111bb898558SAl Viro 	int			x86_cache_alignment;	/* In bytes */
112bb898558SAl Viro 	int			x86_power;
113bb898558SAl Viro 	unsigned long		loops_per_jiffy;
114bb898558SAl Viro 	/* cpuid returned max cores value: */
115bb898558SAl Viro 	u16			 x86_max_cores;
116bb898558SAl Viro 	u16			apicid;
117bb898558SAl Viro 	u16			initial_apicid;
118bb898558SAl Viro 	u16			x86_clflush_size;
119bb898558SAl Viro 	/* number of cores as seen by the OS: */
120bb898558SAl Viro 	u16			booted_cores;
121bb898558SAl Viro 	/* Physical processor id: */
122bb898558SAl Viro 	u16			phys_proc_id;
123bb898558SAl Viro 	/* Core id: */
124bb898558SAl Viro 	u16			cpu_core_id;
1256057b4d3SAndreas Herrmann 	/* Compute unit id */
1266057b4d3SAndreas Herrmann 	u8			compute_unit_id;
127bb898558SAl Viro 	/* Index into per_cpu list: */
128bb898558SAl Viro 	u16			cpu_index;
129506ed6b5SAndi Kleen 	u32			microcode;
130bb898558SAl Viro } __attribute__((__aligned__(SMP_CACHE_BYTES)));
131bb898558SAl Viro 
132bb898558SAl Viro #define X86_VENDOR_INTEL	0
133bb898558SAl Viro #define X86_VENDOR_CYRIX	1
134bb898558SAl Viro #define X86_VENDOR_AMD		2
135bb898558SAl Viro #define X86_VENDOR_UMC		3
136bb898558SAl Viro #define X86_VENDOR_CENTAUR	5
137bb898558SAl Viro #define X86_VENDOR_TRANSMETA	7
138bb898558SAl Viro #define X86_VENDOR_NSC		8
139bb898558SAl Viro #define X86_VENDOR_NUM		9
140bb898558SAl Viro 
141bb898558SAl Viro #define X86_VENDOR_UNKNOWN	0xff
142bb898558SAl Viro 
143bb898558SAl Viro /*
144bb898558SAl Viro  * capabilities of CPUs
145bb898558SAl Viro  */
146bb898558SAl Viro extern struct cpuinfo_x86	boot_cpu_data;
147bb898558SAl Viro extern struct cpuinfo_x86	new_cpu_data;
148bb898558SAl Viro 
149bb898558SAl Viro extern struct tss_struct	doublefault_tss;
1503e0c3737SYinghai Lu extern __u32			cpu_caps_cleared[NCAPINTS];
1513e0c3737SYinghai Lu extern __u32			cpu_caps_set[NCAPINTS];
152bb898558SAl Viro 
153bb898558SAl Viro #ifdef CONFIG_SMP
1549b8de747SDavid Howells DECLARE_PER_CPU_SHARED_ALIGNED(struct cpuinfo_x86, cpu_info);
155bb898558SAl Viro #define cpu_data(cpu)		per_cpu(cpu_info, cpu)
156bb898558SAl Viro #else
1577b543a53STejun Heo #define cpu_info		boot_cpu_data
158bb898558SAl Viro #define cpu_data(cpu)		boot_cpu_data
159bb898558SAl Viro #endif
160bb898558SAl Viro 
161bb898558SAl Viro extern const struct seq_operations cpuinfo_op;
162bb898558SAl Viro 
163bb898558SAl Viro #define cache_line_size()	(boot_cpu_data.x86_cache_alignment)
164bb898558SAl Viro 
165bb898558SAl Viro extern void cpu_detect(struct cpuinfo_x86 *c);
166148f9bb8SPaul Gortmaker extern void fpu_detect(struct cpuinfo_x86 *c);
167bb898558SAl Viro 
168bb898558SAl Viro extern void early_cpu_init(void);
169bb898558SAl Viro extern void identify_boot_cpu(void);
170bb898558SAl Viro extern void identify_secondary_cpu(struct cpuinfo_x86 *);
171bb898558SAl Viro extern void print_cpu_info(struct cpuinfo_x86 *);
17221c3fcf3SYinghai Lu void print_cpu_msr(struct cpuinfo_x86 *);
173bb898558SAl Viro extern void init_scattered_cpuid_features(struct cpuinfo_x86 *c);
174bb898558SAl Viro extern unsigned int init_intel_cacheinfo(struct cpuinfo_x86 *c);
17504a15418SAndreas Herrmann extern void init_amd_cacheinfo(struct cpuinfo_x86 *c);
176bb898558SAl Viro 
177bb898558SAl Viro extern void detect_extended_topology(struct cpuinfo_x86 *c);
178bb898558SAl Viro extern void detect_ht(struct cpuinfo_x86 *c);
179bb898558SAl Viro 
180d288e1cfSFenghua Yu #ifdef CONFIG_X86_32
181d288e1cfSFenghua Yu extern int have_cpuid_p(void);
182d288e1cfSFenghua Yu #else
183d288e1cfSFenghua Yu static inline int have_cpuid_p(void)
184d288e1cfSFenghua Yu {
185d288e1cfSFenghua Yu 	return 1;
186d288e1cfSFenghua Yu }
187d288e1cfSFenghua Yu #endif
188bb898558SAl Viro static inline void native_cpuid(unsigned int *eax, unsigned int *ebx,
189bb898558SAl Viro 				unsigned int *ecx, unsigned int *edx)
190bb898558SAl Viro {
191bb898558SAl Viro 	/* ecx is often an input as well as an output. */
19245a94d7cSSuresh Siddha 	asm volatile("cpuid"
193bb898558SAl Viro 	    : "=a" (*eax),
194bb898558SAl Viro 	      "=b" (*ebx),
195bb898558SAl Viro 	      "=c" (*ecx),
196bb898558SAl Viro 	      "=d" (*edx)
197506ed6b5SAndi Kleen 	    : "0" (*eax), "2" (*ecx)
198506ed6b5SAndi Kleen 	    : "memory");
199bb898558SAl Viro }
200bb898558SAl Viro 
201bb898558SAl Viro static inline void load_cr3(pgd_t *pgdir)
202bb898558SAl Viro {
203bb898558SAl Viro 	write_cr3(__pa(pgdir));
204bb898558SAl Viro }
205bb898558SAl Viro 
206bb898558SAl Viro #ifdef CONFIG_X86_32
207bb898558SAl Viro /* This is the TSS defined by the hardware. */
208bb898558SAl Viro struct x86_hw_tss {
209bb898558SAl Viro 	unsigned short		back_link, __blh;
210bb898558SAl Viro 	unsigned long		sp0;
211bb898558SAl Viro 	unsigned short		ss0, __ss0h;
212bb898558SAl Viro 	unsigned long		sp1;
213bb898558SAl Viro 	/* ss1 caches MSR_IA32_SYSENTER_CS: */
214bb898558SAl Viro 	unsigned short		ss1, __ss1h;
215bb898558SAl Viro 	unsigned long		sp2;
216bb898558SAl Viro 	unsigned short		ss2, __ss2h;
217bb898558SAl Viro 	unsigned long		__cr3;
218bb898558SAl Viro 	unsigned long		ip;
219bb898558SAl Viro 	unsigned long		flags;
220bb898558SAl Viro 	unsigned long		ax;
221bb898558SAl Viro 	unsigned long		cx;
222bb898558SAl Viro 	unsigned long		dx;
223bb898558SAl Viro 	unsigned long		bx;
224bb898558SAl Viro 	unsigned long		sp;
225bb898558SAl Viro 	unsigned long		bp;
226bb898558SAl Viro 	unsigned long		si;
227bb898558SAl Viro 	unsigned long		di;
228bb898558SAl Viro 	unsigned short		es, __esh;
229bb898558SAl Viro 	unsigned short		cs, __csh;
230bb898558SAl Viro 	unsigned short		ss, __ssh;
231bb898558SAl Viro 	unsigned short		ds, __dsh;
232bb898558SAl Viro 	unsigned short		fs, __fsh;
233bb898558SAl Viro 	unsigned short		gs, __gsh;
234bb898558SAl Viro 	unsigned short		ldt, __ldth;
235bb898558SAl Viro 	unsigned short		trace;
236bb898558SAl Viro 	unsigned short		io_bitmap_base;
237bb898558SAl Viro 
238bb898558SAl Viro } __attribute__((packed));
239bb898558SAl Viro #else
240bb898558SAl Viro struct x86_hw_tss {
241bb898558SAl Viro 	u32			reserved1;
242bb898558SAl Viro 	u64			sp0;
243bb898558SAl Viro 	u64			sp1;
244bb898558SAl Viro 	u64			sp2;
245bb898558SAl Viro 	u64			reserved2;
246bb898558SAl Viro 	u64			ist[7];
247bb898558SAl Viro 	u32			reserved3;
248bb898558SAl Viro 	u32			reserved4;
249bb898558SAl Viro 	u16			reserved5;
250bb898558SAl Viro 	u16			io_bitmap_base;
251bb898558SAl Viro 
252bb898558SAl Viro } __attribute__((packed)) ____cacheline_aligned;
253bb898558SAl Viro #endif
254bb898558SAl Viro 
255bb898558SAl Viro /*
256bb898558SAl Viro  * IO-bitmap sizes:
257bb898558SAl Viro  */
258bb898558SAl Viro #define IO_BITMAP_BITS			65536
259bb898558SAl Viro #define IO_BITMAP_BYTES			(IO_BITMAP_BITS/8)
260bb898558SAl Viro #define IO_BITMAP_LONGS			(IO_BITMAP_BYTES/sizeof(long))
261bb898558SAl Viro #define IO_BITMAP_OFFSET		offsetof(struct tss_struct, io_bitmap)
262bb898558SAl Viro #define INVALID_IO_BITMAP_OFFSET	0x8000
263bb898558SAl Viro 
264bb898558SAl Viro struct tss_struct {
265bb898558SAl Viro 	/*
266bb898558SAl Viro 	 * The hardware state:
267bb898558SAl Viro 	 */
268bb898558SAl Viro 	struct x86_hw_tss	x86_tss;
269bb898558SAl Viro 
270bb898558SAl Viro 	/*
271bb898558SAl Viro 	 * The extra 1 is there because the CPU will access an
272bb898558SAl Viro 	 * additional byte beyond the end of the IO permission
273bb898558SAl Viro 	 * bitmap. The extra byte must be all 1 bits, and must
274bb898558SAl Viro 	 * be within the limit.
275bb898558SAl Viro 	 */
276bb898558SAl Viro 	unsigned long		io_bitmap[IO_BITMAP_LONGS + 1];
277bb898558SAl Viro 
278bb898558SAl Viro 	/*
279bb898558SAl Viro 	 * .. and then another 0x100 bytes for the emergency kernel stack:
280bb898558SAl Viro 	 */
281bb898558SAl Viro 	unsigned long		stack[64];
282bb898558SAl Viro 
283bb898558SAl Viro } ____cacheline_aligned;
284bb898558SAl Viro 
2859b8de747SDavid Howells DECLARE_PER_CPU_SHARED_ALIGNED(struct tss_struct, init_tss);
286bb898558SAl Viro 
287bb898558SAl Viro /*
288bb898558SAl Viro  * Save the original ist values for checking stack pointers during debugging
289bb898558SAl Viro  */
290bb898558SAl Viro struct orig_ist {
291bb898558SAl Viro 	unsigned long		ist[7];
292bb898558SAl Viro };
293bb898558SAl Viro 
294bb898558SAl Viro #define	MXCSR_DEFAULT		0x1f80
295bb898558SAl Viro 
296bb898558SAl Viro struct i387_fsave_struct {
297bb898558SAl Viro 	u32			cwd;	/* FPU Control Word		*/
298bb898558SAl Viro 	u32			swd;	/* FPU Status Word		*/
299bb898558SAl Viro 	u32			twd;	/* FPU Tag Word			*/
300bb898558SAl Viro 	u32			fip;	/* FPU IP Offset		*/
301bb898558SAl Viro 	u32			fcs;	/* FPU IP Selector		*/
302bb898558SAl Viro 	u32			foo;	/* FPU Operand Pointer Offset	*/
303bb898558SAl Viro 	u32			fos;	/* FPU Operand Pointer Selector	*/
304bb898558SAl Viro 
305bb898558SAl Viro 	/* 8*10 bytes for each FP-reg = 80 bytes:			*/
306bb898558SAl Viro 	u32			st_space[20];
307bb898558SAl Viro 
308bb898558SAl Viro 	/* Software status information [not touched by FSAVE ]:		*/
309bb898558SAl Viro 	u32			status;
310bb898558SAl Viro };
311bb898558SAl Viro 
312bb898558SAl Viro struct i387_fxsave_struct {
313bb898558SAl Viro 	u16			cwd; /* Control Word			*/
314bb898558SAl Viro 	u16			swd; /* Status Word			*/
315bb898558SAl Viro 	u16			twd; /* Tag Word			*/
316bb898558SAl Viro 	u16			fop; /* Last Instruction Opcode		*/
317bb898558SAl Viro 	union {
318bb898558SAl Viro 		struct {
319bb898558SAl Viro 			u64	rip; /* Instruction Pointer		*/
320bb898558SAl Viro 			u64	rdp; /* Data Pointer			*/
321bb898558SAl Viro 		};
322bb898558SAl Viro 		struct {
323bb898558SAl Viro 			u32	fip; /* FPU IP Offset			*/
324bb898558SAl Viro 			u32	fcs; /* FPU IP Selector			*/
325bb898558SAl Viro 			u32	foo; /* FPU Operand Offset		*/
326bb898558SAl Viro 			u32	fos; /* FPU Operand Selector		*/
327bb898558SAl Viro 		};
328bb898558SAl Viro 	};
329bb898558SAl Viro 	u32			mxcsr;		/* MXCSR Register State */
330bb898558SAl Viro 	u32			mxcsr_mask;	/* MXCSR Mask		*/
331bb898558SAl Viro 
332bb898558SAl Viro 	/* 8*16 bytes for each FP-reg = 128 bytes:			*/
333bb898558SAl Viro 	u32			st_space[32];
334bb898558SAl Viro 
335bb898558SAl Viro 	/* 16*16 bytes for each XMM-reg = 256 bytes:			*/
336bb898558SAl Viro 	u32			xmm_space[64];
337bb898558SAl Viro 
338bb898558SAl Viro 	u32			padding[12];
339bb898558SAl Viro 
340bb898558SAl Viro 	union {
341bb898558SAl Viro 		u32		padding1[12];
342bb898558SAl Viro 		u32		sw_reserved[12];
343bb898558SAl Viro 	};
344bb898558SAl Viro 
345bb898558SAl Viro } __attribute__((aligned(16)));
346bb898558SAl Viro 
347bb898558SAl Viro struct i387_soft_struct {
348bb898558SAl Viro 	u32			cwd;
349bb898558SAl Viro 	u32			swd;
350bb898558SAl Viro 	u32			twd;
351bb898558SAl Viro 	u32			fip;
352bb898558SAl Viro 	u32			fcs;
353bb898558SAl Viro 	u32			foo;
354bb898558SAl Viro 	u32			fos;
355bb898558SAl Viro 	/* 8*10 bytes for each FP-reg = 80 bytes: */
356bb898558SAl Viro 	u32			st_space[20];
357bb898558SAl Viro 	u8			ftop;
358bb898558SAl Viro 	u8			changed;
359bb898558SAl Viro 	u8			lookahead;
360bb898558SAl Viro 	u8			no_update;
361bb898558SAl Viro 	u8			rm;
362bb898558SAl Viro 	u8			alimit;
363ae6af41fSTejun Heo 	struct math_emu_info	*info;
364bb898558SAl Viro 	u32			entry_eip;
365bb898558SAl Viro };
366bb898558SAl Viro 
367a30469e7SSuresh Siddha struct ymmh_struct {
368a30469e7SSuresh Siddha 	/* 16 * 16 bytes for each YMMH-reg = 256 bytes */
369a30469e7SSuresh Siddha 	u32 ymmh_space[64];
370a30469e7SSuresh Siddha };
371a30469e7SSuresh Siddha 
372741e3902SIngo Molnar /* We don't support LWP yet: */
373e7d820a5SQiaowei Ren struct lwp_struct {
374741e3902SIngo Molnar 	u8 reserved[128];
375e7d820a5SQiaowei Ren };
376e7d820a5SQiaowei Ren 
377e7d820a5SQiaowei Ren struct bndregs_struct {
378e7d820a5SQiaowei Ren 	u64 bndregs[8];
379e7d820a5SQiaowei Ren } __packed;
380e7d820a5SQiaowei Ren 
381e7d820a5SQiaowei Ren struct bndcsr_struct {
382e7d820a5SQiaowei Ren 	u64 cfg_reg_u;
383e7d820a5SQiaowei Ren 	u64 status_reg;
384e7d820a5SQiaowei Ren } __packed;
385e7d820a5SQiaowei Ren 
386bb898558SAl Viro struct xsave_hdr_struct {
387bb898558SAl Viro 	u64 xstate_bv;
3880b29643aSFenghua Yu 	u64 xcomp_bv;
3890b29643aSFenghua Yu 	u64 reserved[6];
390bb898558SAl Viro } __attribute__((packed));
391bb898558SAl Viro 
392bb898558SAl Viro struct xsave_struct {
393bb898558SAl Viro 	struct i387_fxsave_struct i387;
394bb898558SAl Viro 	struct xsave_hdr_struct xsave_hdr;
395a30469e7SSuresh Siddha 	struct ymmh_struct ymmh;
396e7d820a5SQiaowei Ren 	struct lwp_struct lwp;
397e7d820a5SQiaowei Ren 	struct bndregs_struct bndregs;
398e7d820a5SQiaowei Ren 	struct bndcsr_struct bndcsr;
399bb898558SAl Viro 	/* new processor state extensions will go here */
400bb898558SAl Viro } __attribute__ ((packed, aligned (64)));
401bb898558SAl Viro 
402bb898558SAl Viro union thread_xstate {
403bb898558SAl Viro 	struct i387_fsave_struct	fsave;
404bb898558SAl Viro 	struct i387_fxsave_struct	fxsave;
405bb898558SAl Viro 	struct i387_soft_struct		soft;
406bb898558SAl Viro 	struct xsave_struct		xsave;
407bb898558SAl Viro };
408bb898558SAl Viro 
40986603283SAvi Kivity struct fpu {
4107e16838dSLinus Torvalds 	unsigned int last_cpu;
4117e16838dSLinus Torvalds 	unsigned int has_fpu;
41286603283SAvi Kivity 	union thread_xstate *state;
41386603283SAvi Kivity };
41486603283SAvi Kivity 
415bb898558SAl Viro #ifdef CONFIG_X86_64
416bb898558SAl Viro DECLARE_PER_CPU(struct orig_ist, orig_ist);
41726f80bd6SBrian Gerst 
418947e76cdSBrian Gerst union irq_stack_union {
419947e76cdSBrian Gerst 	char irq_stack[IRQ_STACK_SIZE];
420947e76cdSBrian Gerst 	/*
421947e76cdSBrian Gerst 	 * GCC hardcodes the stack canary as %gs:40.  Since the
422947e76cdSBrian Gerst 	 * irq_stack is the object at %gs:0, we reserve the bottom
423947e76cdSBrian Gerst 	 * 48 bytes of the irq stack for the canary.
424947e76cdSBrian Gerst 	 */
425947e76cdSBrian Gerst 	struct {
426947e76cdSBrian Gerst 		char gs_base[40];
427947e76cdSBrian Gerst 		unsigned long stack_canary;
428947e76cdSBrian Gerst 	};
429947e76cdSBrian Gerst };
430947e76cdSBrian Gerst 
431277d5b40SAndi Kleen DECLARE_PER_CPU_FIRST(union irq_stack_union, irq_stack_union) __visible;
4322add8e23SBrian Gerst DECLARE_INIT_PER_CPU(irq_stack_union);
4332add8e23SBrian Gerst 
43426f80bd6SBrian Gerst DECLARE_PER_CPU(char *, irq_stack_ptr);
4359766cdbcSJaswinder Singh Rajput DECLARE_PER_CPU(unsigned int, irq_count);
4369766cdbcSJaswinder Singh Rajput extern asmlinkage void ignore_sysret(void);
43760a5317fSTejun Heo #else	/* X86_64 */
43860a5317fSTejun Heo #ifdef CONFIG_CC_STACKPROTECTOR
4391ea0d14eSJeremy Fitzhardinge /*
4401ea0d14eSJeremy Fitzhardinge  * Make sure stack canary segment base is cached-aligned:
4411ea0d14eSJeremy Fitzhardinge  *   "For Intel Atom processors, avoid non zero segment base address
4421ea0d14eSJeremy Fitzhardinge  *    that is not aligned to cache line boundary at all cost."
4431ea0d14eSJeremy Fitzhardinge  * (Optim Ref Manual Assembly/Compiler Coding Rule 15.)
4441ea0d14eSJeremy Fitzhardinge  */
4451ea0d14eSJeremy Fitzhardinge struct stack_canary {
4461ea0d14eSJeremy Fitzhardinge 	char __pad[20];		/* canary at %gs:20 */
4471ea0d14eSJeremy Fitzhardinge 	unsigned long canary;
4481ea0d14eSJeremy Fitzhardinge };
44953f82452SJeremy Fitzhardinge DECLARE_PER_CPU_ALIGNED(struct stack_canary, stack_canary);
450bb898558SAl Viro #endif
451198d208dSSteven Rostedt /*
452198d208dSSteven Rostedt  * per-CPU IRQ handling stacks
453198d208dSSteven Rostedt  */
454198d208dSSteven Rostedt struct irq_stack {
455198d208dSSteven Rostedt 	u32                     stack[THREAD_SIZE/sizeof(u32)];
456198d208dSSteven Rostedt } __aligned(THREAD_SIZE);
457198d208dSSteven Rostedt 
458198d208dSSteven Rostedt DECLARE_PER_CPU(struct irq_stack *, hardirq_stack);
459198d208dSSteven Rostedt DECLARE_PER_CPU(struct irq_stack *, softirq_stack);
46060a5317fSTejun Heo #endif	/* X86_64 */
461bb898558SAl Viro 
462bb898558SAl Viro extern unsigned int xstate_size;
463bb898558SAl Viro extern void free_thread_xstate(struct task_struct *);
464bb898558SAl Viro extern struct kmem_cache *task_xstate_cachep;
465bb898558SAl Viro 
46624f1e32cSFrederic Weisbecker struct perf_event;
46724f1e32cSFrederic Weisbecker 
468bb898558SAl Viro struct thread_struct {
469bb898558SAl Viro 	/* Cached TLS descriptors: */
470bb898558SAl Viro 	struct desc_struct	tls_array[GDT_ENTRY_TLS_ENTRIES];
471bb898558SAl Viro 	unsigned long		sp0;
472bb898558SAl Viro 	unsigned long		sp;
473bb898558SAl Viro #ifdef CONFIG_X86_32
474bb898558SAl Viro 	unsigned long		sysenter_cs;
475bb898558SAl Viro #else
476bb898558SAl Viro 	unsigned long		usersp;	/* Copy from PDA */
477bb898558SAl Viro 	unsigned short		es;
478bb898558SAl Viro 	unsigned short		ds;
479bb898558SAl Viro 	unsigned short		fsindex;
480bb898558SAl Viro 	unsigned short		gsindex;
481bb898558SAl Viro #endif
4820c23590fSAlexey Dobriyan #ifdef CONFIG_X86_32
483bb898558SAl Viro 	unsigned long		ip;
4840c23590fSAlexey Dobriyan #endif
485d756f4adSAlexey Dobriyan #ifdef CONFIG_X86_64
486bb898558SAl Viro 	unsigned long		fs;
487d756f4adSAlexey Dobriyan #endif
488bb898558SAl Viro 	unsigned long		gs;
48924f1e32cSFrederic Weisbecker 	/* Save middle states of ptrace breakpoints */
49024f1e32cSFrederic Weisbecker 	struct perf_event	*ptrace_bps[HBP_NUM];
49124f1e32cSFrederic Weisbecker 	/* Debug status used for traps, single steps, etc... */
492bb898558SAl Viro 	unsigned long           debugreg6;
493326264a0SFrederic Weisbecker 	/* Keep track of the exact dr7 value set by the user */
494326264a0SFrederic Weisbecker 	unsigned long           ptrace_dr7;
495bb898558SAl Viro 	/* Fault info: */
496bb898558SAl Viro 	unsigned long		cr2;
49751e7dc70SSrikar Dronamraju 	unsigned long		trap_nr;
498bb898558SAl Viro 	unsigned long		error_code;
499bb898558SAl Viro 	/* floating point and extended processor state */
50086603283SAvi Kivity 	struct fpu		fpu;
501bb898558SAl Viro #ifdef CONFIG_X86_32
502bb898558SAl Viro 	/* Virtual 86 mode info */
503bb898558SAl Viro 	struct vm86_struct __user *vm86_info;
504bb898558SAl Viro 	unsigned long		screen_bitmap;
505bb898558SAl Viro 	unsigned long		v86flags;
506bb898558SAl Viro 	unsigned long		v86mask;
507bb898558SAl Viro 	unsigned long		saved_sp0;
508bb898558SAl Viro 	unsigned int		saved_fs;
509bb898558SAl Viro 	unsigned int		saved_gs;
510bb898558SAl Viro #endif
511bb898558SAl Viro 	/* IO permissions: */
512bb898558SAl Viro 	unsigned long		*io_bitmap_ptr;
513bb898558SAl Viro 	unsigned long		iopl;
514bb898558SAl Viro 	/* Max allowed port in the bitmap, in bytes: */
515bb898558SAl Viro 	unsigned		io_bitmap_max;
516c375f15aSVineet Gupta 	/*
517c375f15aSVineet Gupta 	 * fpu_counter contains the number of consecutive context switches
518c375f15aSVineet Gupta 	 * that the FPU is used. If this is over a threshold, the lazy fpu
519c375f15aSVineet Gupta 	 * saving becomes unlazy to save the trap. This is an unsigned char
520c375f15aSVineet Gupta 	 * so that after 256 times the counter wraps and the behavior turns
521c375f15aSVineet Gupta 	 * lazy again; this to deal with bursty apps that only use FPU for
522c375f15aSVineet Gupta 	 * a short time
523c375f15aSVineet Gupta 	 */
524c375f15aSVineet Gupta 	unsigned char fpu_counter;
525bb898558SAl Viro };
526bb898558SAl Viro 
527bb898558SAl Viro /*
528bb898558SAl Viro  * Set IOPL bits in EFLAGS from given mask
529bb898558SAl Viro  */
530bb898558SAl Viro static inline void native_set_iopl_mask(unsigned mask)
531bb898558SAl Viro {
532bb898558SAl Viro #ifdef CONFIG_X86_32
533bb898558SAl Viro 	unsigned int reg;
534bb898558SAl Viro 
535bb898558SAl Viro 	asm volatile ("pushfl;"
536bb898558SAl Viro 		      "popl %0;"
537bb898558SAl Viro 		      "andl %1, %0;"
538bb898558SAl Viro 		      "orl %2, %0;"
539bb898558SAl Viro 		      "pushl %0;"
540bb898558SAl Viro 		      "popfl"
541bb898558SAl Viro 		      : "=&r" (reg)
542bb898558SAl Viro 		      : "i" (~X86_EFLAGS_IOPL), "r" (mask));
543bb898558SAl Viro #endif
544bb898558SAl Viro }
545bb898558SAl Viro 
546bb898558SAl Viro static inline void
547bb898558SAl Viro native_load_sp0(struct tss_struct *tss, struct thread_struct *thread)
548bb898558SAl Viro {
549bb898558SAl Viro 	tss->x86_tss.sp0 = thread->sp0;
550bb898558SAl Viro #ifdef CONFIG_X86_32
551bb898558SAl Viro 	/* Only happens when SEP is enabled, no need to test "SEP"arately: */
552bb898558SAl Viro 	if (unlikely(tss->x86_tss.ss1 != thread->sysenter_cs)) {
553bb898558SAl Viro 		tss->x86_tss.ss1 = thread->sysenter_cs;
554bb898558SAl Viro 		wrmsr(MSR_IA32_SYSENTER_CS, thread->sysenter_cs, 0);
555bb898558SAl Viro 	}
556bb898558SAl Viro #endif
557bb898558SAl Viro }
558bb898558SAl Viro 
559bb898558SAl Viro static inline void native_swapgs(void)
560bb898558SAl Viro {
561bb898558SAl Viro #ifdef CONFIG_X86_64
562bb898558SAl Viro 	asm volatile("swapgs" ::: "memory");
563bb898558SAl Viro #endif
564bb898558SAl Viro }
565bb898558SAl Viro 
566bb898558SAl Viro #ifdef CONFIG_PARAVIRT
567bb898558SAl Viro #include <asm/paravirt.h>
568bb898558SAl Viro #else
569bb898558SAl Viro #define __cpuid			native_cpuid
570bb898558SAl Viro #define paravirt_enabled()	0
571bb898558SAl Viro 
572bb898558SAl Viro static inline void load_sp0(struct tss_struct *tss,
573bb898558SAl Viro 			    struct thread_struct *thread)
574bb898558SAl Viro {
575bb898558SAl Viro 	native_load_sp0(tss, thread);
576bb898558SAl Viro }
577bb898558SAl Viro 
578bb898558SAl Viro #define set_iopl_mask native_set_iopl_mask
579bb898558SAl Viro #endif /* CONFIG_PARAVIRT */
580bb898558SAl Viro 
581bb898558SAl Viro /*
582bb898558SAl Viro  * Save the cr4 feature set we're using (ie
583bb898558SAl Viro  * Pentium 4MB enable and PPro Global page
584bb898558SAl Viro  * enable), so that any CPU's that boot up
585bb898558SAl Viro  * after us can get the correct flags.
586bb898558SAl Viro  */
587bb898558SAl Viro extern unsigned long mmu_cr4_features;
588cda846f1SJarkko Sakkinen extern u32 *trampoline_cr4_features;
589bb898558SAl Viro 
590bb898558SAl Viro static inline void set_in_cr4(unsigned long mask)
591bb898558SAl Viro {
5922df7a6e9SBrian Gerst 	unsigned long cr4;
593bb898558SAl Viro 
594bb898558SAl Viro 	mmu_cr4_features |= mask;
595cda846f1SJarkko Sakkinen 	if (trampoline_cr4_features)
596cda846f1SJarkko Sakkinen 		*trampoline_cr4_features = mmu_cr4_features;
597bb898558SAl Viro 	cr4 = read_cr4();
598bb898558SAl Viro 	cr4 |= mask;
599bb898558SAl Viro 	write_cr4(cr4);
600bb898558SAl Viro }
601bb898558SAl Viro 
602bb898558SAl Viro static inline void clear_in_cr4(unsigned long mask)
603bb898558SAl Viro {
6042df7a6e9SBrian Gerst 	unsigned long cr4;
605bb898558SAl Viro 
606bb898558SAl Viro 	mmu_cr4_features &= ~mask;
607cda846f1SJarkko Sakkinen 	if (trampoline_cr4_features)
608cda846f1SJarkko Sakkinen 		*trampoline_cr4_features = mmu_cr4_features;
609bb898558SAl Viro 	cr4 = read_cr4();
610bb898558SAl Viro 	cr4 &= ~mask;
611bb898558SAl Viro 	write_cr4(cr4);
612bb898558SAl Viro }
613bb898558SAl Viro 
614bb898558SAl Viro typedef struct {
615bb898558SAl Viro 	unsigned long		seg;
616bb898558SAl Viro } mm_segment_t;
617bb898558SAl Viro 
618bb898558SAl Viro 
619bb898558SAl Viro /* Free all resources held by a thread. */
620bb898558SAl Viro extern void release_thread(struct task_struct *);
621bb898558SAl Viro 
622bb898558SAl Viro unsigned long get_wchan(struct task_struct *p);
623bb898558SAl Viro 
624bb898558SAl Viro /*
625bb898558SAl Viro  * Generic CPUID function
626bb898558SAl Viro  * clear %ecx since some cpus (Cyrix MII) do not set or clear %ecx
627bb898558SAl Viro  * resulting in stale register contents being returned.
628bb898558SAl Viro  */
629bb898558SAl Viro static inline void cpuid(unsigned int op,
630bb898558SAl Viro 			 unsigned int *eax, unsigned int *ebx,
631bb898558SAl Viro 			 unsigned int *ecx, unsigned int *edx)
632bb898558SAl Viro {
633bb898558SAl Viro 	*eax = op;
634bb898558SAl Viro 	*ecx = 0;
635bb898558SAl Viro 	__cpuid(eax, ebx, ecx, edx);
636bb898558SAl Viro }
637bb898558SAl Viro 
638bb898558SAl Viro /* Some CPUID calls want 'count' to be placed in ecx */
639bb898558SAl Viro static inline void cpuid_count(unsigned int op, int count,
640bb898558SAl Viro 			       unsigned int *eax, unsigned int *ebx,
641bb898558SAl Viro 			       unsigned int *ecx, unsigned int *edx)
642bb898558SAl Viro {
643bb898558SAl Viro 	*eax = op;
644bb898558SAl Viro 	*ecx = count;
645bb898558SAl Viro 	__cpuid(eax, ebx, ecx, edx);
646bb898558SAl Viro }
647bb898558SAl Viro 
648bb898558SAl Viro /*
649bb898558SAl Viro  * CPUID functions returning a single datum
650bb898558SAl Viro  */
651bb898558SAl Viro static inline unsigned int cpuid_eax(unsigned int op)
652bb898558SAl Viro {
653bb898558SAl Viro 	unsigned int eax, ebx, ecx, edx;
654bb898558SAl Viro 
655bb898558SAl Viro 	cpuid(op, &eax, &ebx, &ecx, &edx);
656bb898558SAl Viro 
657bb898558SAl Viro 	return eax;
658bb898558SAl Viro }
659bb898558SAl Viro 
660bb898558SAl Viro static inline unsigned int cpuid_ebx(unsigned int op)
661bb898558SAl Viro {
662bb898558SAl Viro 	unsigned int eax, ebx, ecx, edx;
663bb898558SAl Viro 
664bb898558SAl Viro 	cpuid(op, &eax, &ebx, &ecx, &edx);
665bb898558SAl Viro 
666bb898558SAl Viro 	return ebx;
667bb898558SAl Viro }
668bb898558SAl Viro 
669bb898558SAl Viro static inline unsigned int cpuid_ecx(unsigned int op)
670bb898558SAl Viro {
671bb898558SAl Viro 	unsigned int eax, ebx, ecx, edx;
672bb898558SAl Viro 
673bb898558SAl Viro 	cpuid(op, &eax, &ebx, &ecx, &edx);
674bb898558SAl Viro 
675bb898558SAl Viro 	return ecx;
676bb898558SAl Viro }
677bb898558SAl Viro 
678bb898558SAl Viro static inline unsigned int cpuid_edx(unsigned int op)
679bb898558SAl Viro {
680bb898558SAl Viro 	unsigned int eax, ebx, ecx, edx;
681bb898558SAl Viro 
682bb898558SAl Viro 	cpuid(op, &eax, &ebx, &ecx, &edx);
683bb898558SAl Viro 
684bb898558SAl Viro 	return edx;
685bb898558SAl Viro }
686bb898558SAl Viro 
687bb898558SAl Viro /* REP NOP (PAUSE) is a good thing to insert into busy-wait loops. */
688bb898558SAl Viro static inline void rep_nop(void)
689bb898558SAl Viro {
690bb898558SAl Viro 	asm volatile("rep; nop" ::: "memory");
691bb898558SAl Viro }
692bb898558SAl Viro 
693bb898558SAl Viro static inline void cpu_relax(void)
694bb898558SAl Viro {
695bb898558SAl Viro 	rep_nop();
696bb898558SAl Viro }
697bb898558SAl Viro 
6983a6bfbc9SDavidlohr Bueso #define cpu_relax_lowlatency() cpu_relax()
6993a6bfbc9SDavidlohr Bueso 
7005367b688SBen Hutchings /* Stop speculative execution and prefetching of modified code. */
701bb898558SAl Viro static inline void sync_core(void)
702bb898558SAl Viro {
703bb898558SAl Viro 	int tmp;
704bb898558SAl Viro 
705eb068e78SH. Peter Anvin #ifdef CONFIG_M486
70645c39fb0SH. Peter Anvin 	/*
70745c39fb0SH. Peter Anvin 	 * Do a CPUID if available, otherwise do a jump.  The jump
70845c39fb0SH. Peter Anvin 	 * can conveniently enough be the jump around CPUID.
70945c39fb0SH. Peter Anvin 	 */
71045c39fb0SH. Peter Anvin 	asm volatile("cmpl %2,%1\n\t"
71145c39fb0SH. Peter Anvin 		     "jl 1f\n\t"
71245c39fb0SH. Peter Anvin 		     "cpuid\n"
71345c39fb0SH. Peter Anvin 		     "1:"
71445c39fb0SH. Peter Anvin 		     : "=a" (tmp)
71545c39fb0SH. Peter Anvin 		     : "rm" (boot_cpu_data.cpuid_level), "ri" (0), "0" (1)
716bb898558SAl Viro 		     : "ebx", "ecx", "edx", "memory");
71745c39fb0SH. Peter Anvin #else
71845c39fb0SH. Peter Anvin 	/*
71945c39fb0SH. Peter Anvin 	 * CPUID is a barrier to speculative execution.
72045c39fb0SH. Peter Anvin 	 * Prefetched instructions are automatically
72145c39fb0SH. Peter Anvin 	 * invalidated when modified.
72245c39fb0SH. Peter Anvin 	 */
72345c39fb0SH. Peter Anvin 	asm volatile("cpuid"
72445c39fb0SH. Peter Anvin 		     : "=a" (tmp)
72545c39fb0SH. Peter Anvin 		     : "0" (1)
72645c39fb0SH. Peter Anvin 		     : "ebx", "ecx", "edx", "memory");
72745c39fb0SH. Peter Anvin #endif
728bb898558SAl Viro }
729bb898558SAl Viro 
730bb898558SAl Viro extern void select_idle_routine(const struct cpuinfo_x86 *c);
73102c68a02SLen Brown extern void init_amd_e400_c1e_mask(void);
732bb898558SAl Viro 
733bb898558SAl Viro extern unsigned long		boot_option_idle_override;
73402c68a02SLen Brown extern bool			amd_e400_c1e_detected;
735bb898558SAl Viro 
736d1896049SThomas Renninger enum idle_boot_override {IDLE_NO_OVERRIDE=0, IDLE_HALT, IDLE_NOMWAIT,
73769fb3676SLen Brown 			 IDLE_POLL};
738d1896049SThomas Renninger 
739bb898558SAl Viro extern void enable_sep_cpu(void);
740bb898558SAl Viro extern int sysenter_setup(void);
741bb898558SAl Viro 
74229c84391SJan Kiszka extern void early_trap_init(void);
7438170e6beSH. Peter Anvin void early_trap_pf_init(void);
74429c84391SJan Kiszka 
745bb898558SAl Viro /* Defined in head.S */
746bb898558SAl Viro extern struct desc_ptr		early_gdt_descr;
747bb898558SAl Viro 
748bb898558SAl Viro extern void cpu_set_gdt(int);
749552be871SBrian Gerst extern void switch_to_new_gdt(int);
75011e3a840SJeremy Fitzhardinge extern void load_percpu_segment(int);
751bb898558SAl Viro extern void cpu_init(void);
752bb898558SAl Viro 
753c2724775SMarkus Metzger static inline unsigned long get_debugctlmsr(void)
754c2724775SMarkus Metzger {
755c2724775SMarkus Metzger 	unsigned long debugctlmsr = 0;
756c2724775SMarkus Metzger 
757c2724775SMarkus Metzger #ifndef CONFIG_X86_DEBUGCTLMSR
758c2724775SMarkus Metzger 	if (boot_cpu_data.x86 < 6)
759c2724775SMarkus Metzger 		return 0;
760c2724775SMarkus Metzger #endif
761c2724775SMarkus Metzger 	rdmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
762c2724775SMarkus Metzger 
763c2724775SMarkus Metzger 	return debugctlmsr;
764c2724775SMarkus Metzger }
765c2724775SMarkus Metzger 
766bb898558SAl Viro static inline void update_debugctlmsr(unsigned long debugctlmsr)
767bb898558SAl Viro {
768bb898558SAl Viro #ifndef CONFIG_X86_DEBUGCTLMSR
769bb898558SAl Viro 	if (boot_cpu_data.x86 < 6)
770bb898558SAl Viro 		return;
771bb898558SAl Viro #endif
772bb898558SAl Viro 	wrmsrl(MSR_IA32_DEBUGCTLMSR, debugctlmsr);
773bb898558SAl Viro }
774bb898558SAl Viro 
7759bd1190aSOleg Nesterov extern void set_task_blockstep(struct task_struct *task, bool on);
7769bd1190aSOleg Nesterov 
777bb898558SAl Viro /*
778bb898558SAl Viro  * from system description table in BIOS. Mostly for MCA use, but
779bb898558SAl Viro  * others may find it useful:
780bb898558SAl Viro  */
781bb898558SAl Viro extern unsigned int		machine_id;
782bb898558SAl Viro extern unsigned int		machine_submodel_id;
783bb898558SAl Viro extern unsigned int		BIOS_revision;
784bb898558SAl Viro 
785bb898558SAl Viro /* Boot loader type from the setup header: */
786bb898558SAl Viro extern int			bootloader_type;
7875031296cSH. Peter Anvin extern int			bootloader_version;
788bb898558SAl Viro 
789bb898558SAl Viro extern char			ignore_fpu_irq;
790bb898558SAl Viro 
791bb898558SAl Viro #define HAVE_ARCH_PICK_MMAP_LAYOUT 1
792bb898558SAl Viro #define ARCH_HAS_PREFETCHW
793bb898558SAl Viro #define ARCH_HAS_SPINLOCK_PREFETCH
794bb898558SAl Viro 
795bb898558SAl Viro #ifdef CONFIG_X86_32
796bb898558SAl Viro # define BASE_PREFETCH		ASM_NOP4
797bb898558SAl Viro # define ARCH_HAS_PREFETCH
798bb898558SAl Viro #else
799bb898558SAl Viro # define BASE_PREFETCH		"prefetcht0 (%1)"
800bb898558SAl Viro #endif
801bb898558SAl Viro 
802bb898558SAl Viro /*
803bb898558SAl Viro  * Prefetch instructions for Pentium III (+) and AMD Athlon (+)
804bb898558SAl Viro  *
805bb898558SAl Viro  * It's not worth to care about 3dnow prefetches for the K6
806bb898558SAl Viro  * because they are microcoded there and very slow.
807bb898558SAl Viro  */
808bb898558SAl Viro static inline void prefetch(const void *x)
809bb898558SAl Viro {
810bb898558SAl Viro 	alternative_input(BASE_PREFETCH,
811bb898558SAl Viro 			  "prefetchnta (%1)",
812bb898558SAl Viro 			  X86_FEATURE_XMM,
813bb898558SAl Viro 			  "r" (x));
814bb898558SAl Viro }
815bb898558SAl Viro 
816bb898558SAl Viro /*
817bb898558SAl Viro  * 3dnow prefetch to get an exclusive cache line.
818bb898558SAl Viro  * Useful for spinlocks to avoid one state transition in the
819bb898558SAl Viro  * cache coherency protocol:
820bb898558SAl Viro  */
821bb898558SAl Viro static inline void prefetchw(const void *x)
822bb898558SAl Viro {
823bb898558SAl Viro 	alternative_input(BASE_PREFETCH,
824bb898558SAl Viro 			  "prefetchw (%1)",
825bb898558SAl Viro 			  X86_FEATURE_3DNOW,
826bb898558SAl Viro 			  "r" (x));
827bb898558SAl Viro }
828bb898558SAl Viro 
829bb898558SAl Viro static inline void spin_lock_prefetch(const void *x)
830bb898558SAl Viro {
831bb898558SAl Viro 	prefetchw(x);
832bb898558SAl Viro }
833bb898558SAl Viro 
834bb898558SAl Viro #ifdef CONFIG_X86_32
835bb898558SAl Viro /*
836bb898558SAl Viro  * User space process size: 3GB (default).
837bb898558SAl Viro  */
838bb898558SAl Viro #define TASK_SIZE		PAGE_OFFSET
839d9517346SIngo Molnar #define TASK_SIZE_MAX		TASK_SIZE
840bb898558SAl Viro #define STACK_TOP		TASK_SIZE
841bb898558SAl Viro #define STACK_TOP_MAX		STACK_TOP
842bb898558SAl Viro 
843bb898558SAl Viro #define INIT_THREAD  {							  \
844bb898558SAl Viro 	.sp0			= sizeof(init_stack) + (long)&init_stack, \
845bb898558SAl Viro 	.vm86_info		= NULL,					  \
846bb898558SAl Viro 	.sysenter_cs		= __KERNEL_CS,				  \
847bb898558SAl Viro 	.io_bitmap_ptr		= NULL,					  \
848bb898558SAl Viro }
849bb898558SAl Viro 
850bb898558SAl Viro /*
851bb898558SAl Viro  * Note that the .io_bitmap member must be extra-big. This is because
852bb898558SAl Viro  * the CPU will access an additional byte beyond the end of the IO
853bb898558SAl Viro  * permission bitmap. The extra byte must be all 1 bits, and must
854bb898558SAl Viro  * be within the limit.
855bb898558SAl Viro  */
856bb898558SAl Viro #define INIT_TSS  {							  \
857bb898558SAl Viro 	.x86_tss = {							  \
858bb898558SAl Viro 		.sp0		= sizeof(init_stack) + (long)&init_stack, \
859bb898558SAl Viro 		.ss0		= __KERNEL_DS,				  \
860bb898558SAl Viro 		.ss1		= __KERNEL_CS,				  \
861bb898558SAl Viro 		.io_bitmap_base	= INVALID_IO_BITMAP_OFFSET,		  \
862bb898558SAl Viro 	 },								  \
863bb898558SAl Viro 	.io_bitmap		= { [0 ... IO_BITMAP_LONGS] = ~0 },	  \
864bb898558SAl Viro }
865bb898558SAl Viro 
866bb898558SAl Viro extern unsigned long thread_saved_pc(struct task_struct *tsk);
867bb898558SAl Viro 
868bb898558SAl Viro #define THREAD_SIZE_LONGS      (THREAD_SIZE/sizeof(unsigned long))
869bb898558SAl Viro #define KSTK_TOP(info)                                                 \
870bb898558SAl Viro ({                                                                     \
871bb898558SAl Viro        unsigned long *__ptr = (unsigned long *)(info);                 \
872bb898558SAl Viro        (unsigned long)(&__ptr[THREAD_SIZE_LONGS]);                     \
873bb898558SAl Viro })
874bb898558SAl Viro 
875bb898558SAl Viro /*
876bb898558SAl Viro  * The below -8 is to reserve 8 bytes on top of the ring0 stack.
877bb898558SAl Viro  * This is necessary to guarantee that the entire "struct pt_regs"
878b595076aSUwe Kleine-König  * is accessible even if the CPU haven't stored the SS/ESP registers
879bb898558SAl Viro  * on the stack (interrupt gate does not save these registers
880bb898558SAl Viro  * when switching to the same priv ring).
881bb898558SAl Viro  * Therefore beware: accessing the ss/esp fields of the
882bb898558SAl Viro  * "struct pt_regs" is possible, but they may contain the
883bb898558SAl Viro  * completely wrong values.
884bb898558SAl Viro  */
885bb898558SAl Viro #define task_pt_regs(task)                                             \
886bb898558SAl Viro ({                                                                     \
887bb898558SAl Viro        struct pt_regs *__regs__;                                       \
888bb898558SAl Viro        __regs__ = (struct pt_regs *)(KSTK_TOP(task_stack_page(task))-8); \
889bb898558SAl Viro        __regs__ - 1;                                                   \
890bb898558SAl Viro })
891bb898558SAl Viro 
892bb898558SAl Viro #define KSTK_ESP(task)		(task_pt_regs(task)->sp)
893bb898558SAl Viro 
894bb898558SAl Viro #else
895bb898558SAl Viro /*
896*07114f0fSAndy Lutomirski  * User space process size. 47bits minus one guard page.  The guard
897*07114f0fSAndy Lutomirski  * page is necessary on Intel CPUs: if a SYSCALL instruction is at
898*07114f0fSAndy Lutomirski  * the highest possible canonical userspace address, then that
899*07114f0fSAndy Lutomirski  * syscall will enter the kernel with a non-canonical return
900*07114f0fSAndy Lutomirski  * address, and SYSRET will explode dangerously.  We avoid this
901*07114f0fSAndy Lutomirski  * particular problem by preventing anything from being mapped
902*07114f0fSAndy Lutomirski  * at the maximum canonical address.
903bb898558SAl Viro  */
904d9517346SIngo Molnar #define TASK_SIZE_MAX	((1UL << 47) - PAGE_SIZE)
905bb898558SAl Viro 
906bb898558SAl Viro /* This decides where the kernel will search for a free chunk of vm
907bb898558SAl Viro  * space during mmap's.
908bb898558SAl Viro  */
909bb898558SAl Viro #define IA32_PAGE_OFFSET	((current->personality & ADDR_LIMIT_3GB) ? \
910bb898558SAl Viro 					0xc0000000 : 0xFFFFe000)
911bb898558SAl Viro 
9126bd33008SH. Peter Anvin #define TASK_SIZE		(test_thread_flag(TIF_ADDR32) ? \
913d9517346SIngo Molnar 					IA32_PAGE_OFFSET : TASK_SIZE_MAX)
9146bd33008SH. Peter Anvin #define TASK_SIZE_OF(child)	((test_tsk_thread_flag(child, TIF_ADDR32)) ? \
915d9517346SIngo Molnar 					IA32_PAGE_OFFSET : TASK_SIZE_MAX)
916bb898558SAl Viro 
917bb898558SAl Viro #define STACK_TOP		TASK_SIZE
918d9517346SIngo Molnar #define STACK_TOP_MAX		TASK_SIZE_MAX
919bb898558SAl Viro 
920bb898558SAl Viro #define INIT_THREAD  { \
921bb898558SAl Viro 	.sp0 = (unsigned long)&init_stack + sizeof(init_stack) \
922bb898558SAl Viro }
923bb898558SAl Viro 
924bb898558SAl Viro #define INIT_TSS  { \
925bb898558SAl Viro 	.x86_tss.sp0 = (unsigned long)&init_stack + sizeof(init_stack) \
926bb898558SAl Viro }
927bb898558SAl Viro 
928bb898558SAl Viro /*
929bb898558SAl Viro  * Return saved PC of a blocked thread.
930bb898558SAl Viro  * What is this good for? it will be always the scheduler or ret_from_fork.
931bb898558SAl Viro  */
932bb898558SAl Viro #define thread_saved_pc(t)	(*(unsigned long *)((t)->thread.sp - 8))
933bb898558SAl Viro 
934bb898558SAl Viro #define task_pt_regs(tsk)	((struct pt_regs *)(tsk)->thread.sp0 - 1)
93589240ba0SStefani Seibold extern unsigned long KSTK_ESP(struct task_struct *task);
936d046ff8bSH. J. Lu 
937d046ff8bSH. J. Lu /*
938d046ff8bSH. J. Lu  * User space RSP while inside the SYSCALL fast path
939d046ff8bSH. J. Lu  */
940d046ff8bSH. J. Lu DECLARE_PER_CPU(unsigned long, old_rsp);
941d046ff8bSH. J. Lu 
942bb898558SAl Viro #endif /* CONFIG_X86_64 */
943bb898558SAl Viro 
944bb898558SAl Viro extern void start_thread(struct pt_regs *regs, unsigned long new_ip,
945bb898558SAl Viro 					       unsigned long new_sp);
946bb898558SAl Viro 
947bb898558SAl Viro /*
948bb898558SAl Viro  * This decides where the kernel will search for a free chunk of vm
949bb898558SAl Viro  * space during mmap's.
950bb898558SAl Viro  */
951bb898558SAl Viro #define TASK_UNMAPPED_BASE	(PAGE_ALIGN(TASK_SIZE / 3))
952bb898558SAl Viro 
953bb898558SAl Viro #define KSTK_EIP(task)		(task_pt_regs(task)->ip)
954bb898558SAl Viro 
955bb898558SAl Viro /* Get/set a process' ability to use the timestamp counter instruction */
956bb898558SAl Viro #define GET_TSC_CTL(adr)	get_tsc_mode((adr))
957bb898558SAl Viro #define SET_TSC_CTL(val)	set_tsc_mode((val))
958bb898558SAl Viro 
959bb898558SAl Viro extern int get_tsc_mode(unsigned long adr);
960bb898558SAl Viro extern int set_tsc_mode(unsigned int val);
961bb898558SAl Viro 
9628b84c8dfSDaniel J Blueman extern u16 amd_get_nb_id(int cpu);
9636a812691SAndreas Herrmann 
96496e39ac0SJason Wang static inline uint32_t hypervisor_cpuid_base(const char *sig, uint32_t leaves)
96596e39ac0SJason Wang {
96696e39ac0SJason Wang 	uint32_t base, eax, signature[3];
96796e39ac0SJason Wang 
96896e39ac0SJason Wang 	for (base = 0x40000000; base < 0x40010000; base += 0x100) {
96996e39ac0SJason Wang 		cpuid(base, &eax, &signature[0], &signature[1], &signature[2]);
97096e39ac0SJason Wang 
97196e39ac0SJason Wang 		if (!memcmp(sig, signature, 12) &&
97296e39ac0SJason Wang 		    (leaves == 0 || ((eax - base) >= leaves)))
97396e39ac0SJason Wang 			return base;
97496e39ac0SJason Wang 	}
97596e39ac0SJason Wang 
97696e39ac0SJason Wang 	return 0;
97796e39ac0SJason Wang }
97896e39ac0SJason Wang 
979f05e798aSDavid Howells extern unsigned long arch_align_stack(unsigned long sp);
980f05e798aSDavid Howells extern void free_init_pages(char *what, unsigned long begin, unsigned long end);
981f05e798aSDavid Howells 
982f05e798aSDavid Howells void default_idle(void);
9836a377ddcSLen Brown #ifdef	CONFIG_XEN
9846a377ddcSLen Brown bool xen_set_default_idle(void);
9856a377ddcSLen Brown #else
9866a377ddcSLen Brown #define xen_set_default_idle 0
9876a377ddcSLen Brown #endif
988f05e798aSDavid Howells 
989f05e798aSDavid Howells void stop_this_cpu(void *dummy);
9904d067d8eSBorislav Petkov void df_debug(struct pt_regs *regs, long error_code);
9911965aae3SH. Peter Anvin #endif /* _ASM_X86_PROCESSOR_H */
992